Results 81 to 90 of about 8,344 (213)
Spoiled Onions: Exposing Malicious Tor Exit Relays
Several hundred Tor exit relays together push more than 1 GiB/s of network traffic. However, it is easy for exit relays to snoop and tamper with anonymised network traffic and as all relays are run by independent volunteers, not all of them are innocuous.
Lindskog, Stefan, Winter, Philipp
core
Ghera: A Repository of Android App Vulnerability Benchmarks
Security of mobile apps affects the security of their users. This has fueled the development of techniques to automatically detect vulnerabilities in mobile apps and help developers secure their apps; specifically, in the context of Android platform due ...
Arzt Steven +4 more
core +1 more source
Additive manufacturing (AM) transforms space hardware by enabling lightweight, high‐performance, and on‐demand production. This review outlines AM processes—powder bed fusion (PBF), directed energy deposition (DED), binder jetting (BJ), sheet lamination (SL), and material extrusion (ME)—applied to propulsion, satellite structures, and thermal devices ...
Stelios K. Georgantzinos +8 more
wiley +1 more source
HiPass: Hijacking CTAP in Passkey Authentication
Passkeys are designed to enhance the security and convenience of authentication by leveraging Fast Identity Online (FIDO) and Web Authentication (WebAuthn) protocols and utilizing credential information stored on user devices to securely complete the ...
Donghyun Kim +3 more
doaj +1 more source
Stealthy Deception Attacks Against SCADA Systems
SCADA protocols for Industrial Control Systems (ICS) are vulnerable to network attacks such as session hijacking. Hence, research focuses on network anomaly detection based on meta--data (message sizes, timing, command sequence), or on the state values ...
A Kleinmann +12 more
core +1 more source
Learning-based attacks in cyber-physical systems [PDF]
We introduce the problem of learning-based attacks in a simple abstraction of cyber-physical systems---the case of a discrete-time, linear, time-invariant plant that may be subject to an attack that overrides the sensor readings and the controller ...
Franceschetti, Massimo +3 more
core +1 more source
A Modular Dynamic Probabilistic Risk Assessment Framework for Electric Grid Cybersecurity
This paper presents a modular framework designed for dynamic probabilistic risk assessment of electric grid systems facing cybersecurity threats. The functionality and efficacy of the framework have been demonstrated using an IEEE 14‐bus system in a case study.
Xiaoxu Diao +6 more
wiley +1 more source
Signature-Based Security Analysis and Detection of IoT Threats in Advanced Message Queuing Protocol
The Advanced Message Queuing Protocol (AMQP) is a widely used communication standard in IoT systems due to its robust and reliable message delivery capabilities.
Mohammad Emran Hashimyar +3 more
doaj +1 more source
Machine learning‐enhanced NIDS, integrating diverse data sources and rigorous feature selection, achieves near‐perfect detection of sophisticated evasive cyber threats—including APTs, DDoS, zero‐day exploits, and MitM attacks—surpassing industry benchmarks in accuracy, precision, recall, and F1$$ {\mathrm{F}}_1 $$‐score. ABSTRACT Advanced cyber threats
Khandakar Md Shafin +2 more
wiley +1 more source
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security.
Hanzo, Lajos +3 more
core +1 more source

